Bug 1666852

Summary: Apps using SSL_CTX_set_security_level with level >=3 don't work
Product: [Fedora] Fedora Reporter: Cristian Morales Vega <christian.morales.vega>
Component: opensslAssignee: Tomas Mraz <tmraz>
Status: CLOSED ERRATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 29CC: jorton, tmraz
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: openssl-1.1.1a-1.fc29 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-01-18 02:13:54 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Cristian Morales Vega 2019-01-16 18:39:47 UTC
If SSL_CTX_set_security_level() is used with a level >= 3 in a client application the initial handshake fails with "no ciphers available".

I have been able to reproduce the issue with a raw checkout of the OpenSSL_1_1_1 git tag. The problem doesn't appear with the OpenSSL_1_1_1a tag.

To test you can apply this patch to s_client:

--- a/apps/s_client.c
+++ b/apps/s_client.c
@@ -1749,6 +1749,8 @@ int s_client_main(int argc, char **argv)
         SSL_CTX_set_default_read_buffer_len(ctx, read_buf_len);
     }
 
+    SSL_CTX_set_security_level(ctx, 3);
+
     if (maxfraglen > 0
             && !SSL_CTX_set_tlsext_max_fragment_length(ctx, maxfraglen)) {
         BIO_printf(bio_err,

Comment 1 Fedora Update System 2019-01-17 07:16:50 UTC
openssl-1.1.1a-1.fc29 has been submitted as an update to Fedora 29. https://bodhi.fedoraproject.org/updates/FEDORA-2019-a8ffcff7ee

Comment 2 Fedora Update System 2019-01-18 02:13:54 UTC
openssl-1.1.1a-1.fc29 has been pushed to the Fedora 29 stable repository. If problems still persist, please make note of it in this bug report.